Description

The ElementsKit Elementor Addons plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `Live_Action::reset()` function in all versions up to, and including, 3.8.2 The function is hooked to the WordPress `init` action and triggers when both `post` and `action=elementor` GET parameters are present, with no authentication or nonce verification. This makes it possible for unauthenticated attackers to overwrite the Elementor content (`_elementor_data`) of any `elementskit_widget` custom post type by visiting a specially crafted URL. The widget's custom designs, text, and configurations are permanently replaced with a blank template.

INFO

Published Date :

2026-05-05T04:27:56.288Z

Last Modified :

2026-05-05T04:27:56.288Z

Source :

Wordfence
AFFECTED PRODUCTS

The following products are affected by CVE-2026-4362 vulnerability.

Vendors Products
Roxnor
  • Elementskit Elementor Addons – Advanced Widgets & Templates Addons For Elementor
Wordpress
  • Wordpress

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact